W IT i cyberbezpieczeństwie używamy mnóstwa skrótów, których rozwinięcia i znaczenia często wymagają dalszych poszukiwań. Aby ułatwić Ci dostęp do tych informacji, stworzyliśmy zbiór skrótów Cyber Security, który gromadzi większość z nich w jednym miejscu.
Znajdziesz tu również skróty związane z technologiami IT, które często pojawiają się w kontekście bezpieczeństwa. Dodatkowo, klikając na skrót lub jego rozwinięcie, możesz szybko przejść do pełnej definicji w naszym glosariuszu.
Każdy skrót, podobnie jak definicje w słowniku, został starannie wybrany, a tłumaczenia były dokonywane przez profesjonalnego tłumacza. Wszystkie wpisy przeszły kilkukrotne ręczne sprawdzenie, aby zapewnić ich najwyższą jakość. Każdy wpis został również wzbogacony o dedykowaną grafikę, którą możesz swobodnie wykorzystać.
2
2FA ➞ Two-Factor Authentification
3
3DES ➞ Triple DES
3LC ➞ Third Level Code
4
4GL ➞ Fourth-Generation Language
A
AA ➞ Attribute Authority
AAA ➞ Authentication, Authorization, And Accounting
AACA ➞ ASD-Approved Cryptographic Algorithm
AACP ➞ ASD-Approved Cryptographic Protocol
AARL ➞ Attribute Authority Revocation List
AC ➞ Access Control
ACA ➞ Australasian Certification Authority
ACC ➞ Access Control Center
ACCSE ➞ Academic Centres Of Cyber Security Excellence
ACI ➞ Access Control Information
ACK ➞ Acknowledgment
ACL ➞ Access Control List
ACRL ➞ Attribute Certificate Revocation List
ACSC ➞ Australian Cyber Security Centre
ACTR ➞ Average Call Traffic Rate
ACTS ➞ Automated Coin Toll System
ADF ➞ Access Control Decision Function
ADI ➞ Access Control Decision Information
AEF ➞ Access Control EnForcement Function
AES ➞ Advanced Encryption Standard
AGW ➞ Access Gateway
AH ➞ IP Authentication Header
AH ➞ Authentication Header
AI ➞ ARTIFICIAL INTELLIGENCE
AI ➞ Authentication Information
AIDC ➞ Automatic Identification And Data Capture
AIS ➞ Automatic Identification System
AL ➞ ARTIFICIAL LIFE
ALE ➞ Annual Loss Expectancy
ALG ➞ Application Level Gateway
ALU ➞ Arithmetic Logic Unit
AOC ➞ Attestation Of Compliance
AOL ➞ AMERICA ONLINE
AOV ➞ Attestation Of Validation
AP ➞ Access Point
API ➞ Application Program Interface
APOP ➞ Authenticated Post Office Protocol
App ➞ Application
APT ➞ Advanced Persistent Threat
ARF ➞ Asset Reporting Format
ARF ➞ Assessment Results Format
ARP ➞ Address Resolution Protocol
ASCII ➞ American Standard Code for Information Interchange
ASF ➞ Anti-Spam Function
ASICs ➞ Application-Specific Integrated Circuits
ASN ➞ Abstract Syntax Notation One
ASP_MSP ➞ Application Or Managed Service Provider
ASV ➞ Approved Scanning Vendor
AT ➞ Anti-Tamper
AT&T ➞ American Telephone And Telegraph
ATM ➞ Asynchronous Transfer Mode
ATO ➞ Authorization To Operate
ATP ➞ Advanced Threat Protection
AU ➞ Authentication
AuF ➞ Authentication Function
AUP ➞ Acceptable Use Policy
AV ➞ Antivirus (-Al) Software
B
BASIC ➞ Beginner¹s All-Purpose Symbolic Instruction Code
BAU ➞ Business As Usual
BBN ➞ BBN Technologies Corp.
BBS ➞ Bulletin Board System
BC ➞ Biometric Certificate
BCA ➞ Biometric Certificate Authority
BCA ➞ Brand Certification Authority
BCI ➞ Brand CRL Identifier
BCP ➞ Business Continuity Plan
BCRL ➞ Biometric Certificate Revocation List
BDC ➞ Biometric Device Certificate
BE ➞ Border Element
BER ➞ Basic Encoding Rules
BGP ➞ Border Gateway Protocol
BIA ➞ Business Continuity Planning
BIN ➞ Bank Identification Number
BIT ➞ Binary Digit
BLP ➞ Bypass Label Processing
BMIS ➞ Business Model For Information Security
BO ➞ Buffer Overflow
BPC ➞ Biometric Policy Certificate
BPR ➞ Business Process Reengineering
BPS ➞ Bits Per Second
BR ➞ Border Router
BS7799 ➞ British Standard 7799
BSC ➞ Balanced Scorecard
BSI ➞ Boot Sector Infector
BSP ➞ Business Service Provider
BSV ➞ Boot Sector Virus
BYOC ➞ Bring Your Own Computer
BYOL ➞ Bring Your Own Laptop
C
C2 ➞ Command And Control
CA ➞ Certification Authority
CAAT ➞ Computer-Assisted Audit Technique
CAB ➞ Change Advisory Board
CAC ➞ Call Admission Control
CAM ➞ Certificate Arbitrator Module
CAPEC ➞ Common Attack Pattern Enumeration And Classification
CAPEX ➞ Capital Expenditure-Expense
CAPTCHA ➞ Completely Automated Public Turing Test To Tell Computers And Humans Apart
CARL ➞ Certification Authority Revocation List
CASE ➞ Computer-Aided Software Engineering
CASF ➞ Core Asf
CAST ➞ Carlisle Adams (C.A.) Stafford Tavares (S.T.)
CAV ➞ Card Authentication Value
CAV2 ➞ Card Authentication Value 2
CAW ➞ Certificate Authority Workstation
CBC ➞ Cipher Block Chaining
CBC ➞ Cipher Block Chaining Mode
CBCMAC ➞ Cipher Block ChainingMessage Authentication Code
CBR ➞ Call Blocking Rate
CC ➞ Common Criteria
CCA ➞ Cardholder Certification Authority
CCC ➞ CHAOS COMPUTER CLUB
CCE ➞ Common Configuration Enumeration
CCEP ➞ Commercial COMSEC Evaluation Program
CCI ➞ Control Correlation Identifier
CCI ➞ Controlled Cryptographic Item
CCM ➞ Counter With Cipher Block Chaining Message Authentication Code
CCRA ➞ Common Criteria Recognition Arrangement
CCSL ➞ Certified Cloud Services List
CCSS ➞ Common Configuration Scoring System
CCTV ➞ Closed Circuit Television
CDA ➞ COMMUNICATIONS DECENCY ACT
CDc ➞ THE CULT OF THE DEAD COW
CDE ➞ Cardholder Data Environment
CDMA ➞ Code Division Multiple Access
CDN ➞ Content Delivery Network
CEE ➞ Common Event Expression
CEO ➞ Chief Executive Officer
CER ➞ Crossover Error Rate
CERT ➞ Computer Emergency Response Team
CFB ➞ Cipher Feedback
CFO ➞ Chief Financial Officer
CFP ➞ COMPUTERS, FREEDOM AND PRIVACY CONFERENCE
CGCE ➞ Commercial Grade Cryptographic Equipment
CGI ➞ Common Gateway Interface
CHAP ➞ Challenge Handshake Authentication Protocol
CHVP ➞ Cryptographic High Value Product
CIAC ➞ Computer Incident Advisory Capability
CID ➞ Card Identification Number
CIK ➞ Cryptographic Ignition Key
CIM ➞ Cryptographic Information Management
CIMA ➞ Cyber Incident Management Arrangements
CIRT ➞ Computer Incident Response Team
CISO ➞ Chief Information Security Officer
CKL ➞ Compromised Key List
CLEF ➞ Commercially Licensed Evaluation Facility
CMAC ➞ Cipher-Based Message Authentication Code
CMDAUTH ➞ Command Authority
CMDB ➞ Configuration Management Data Base
CMM ➞ Capability Maturity Model
CMOS ➞ Complementary Metal-Oxide-Semiconductor
CMS ➞ Cryptographic Message Syntax
CMSS ➞ Common Misuse Scoring System
CMVP ➞ Cryptographic Module Validation Program
CND ➞ Computer Network Defense
CNSA ➞ Commercial National Security Algorithm
CNSS ➞ Committee on National Security Systems
CO ➞ Cyberspace Operations
COBIT ➞ Control Objectives for Information and Related Technology
COBOL ➞ Common Business Oriented Language
CoCo ➞ Criteria Of Control
COI ➞ Community Of Interest
COIT ➞ Consumerization Of Information Technology
COMPUSEC ➞ Computer Security
COMSEC ➞ Communications Security
COPE ➞ Corporate Owned, Personally Enabled
CORBA ➞ Common Object Request Broker Architecture
COSO ➞ Committee Of Sponsoring Organizations Of The Treadway Commission
COTS ➞ Commercial-Off-The-Shelf
CPSR ➞ COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY
CPU ➞ The Central Processing Unit
CRAM ➞ Challenge-Response Authentication Mechanism
CRC ➞ Cyclic Redundancy Check
CRL ➞ Certificate Revocation List
CRL ➞ X.509 Certificate Revocation List
CRM ➞ Customer Relationship Management System
CRS ➞ Correlative Reacting System
CRSAP ➞ Correlative Reacting System Application Protocol
CRT ➞ Cathode Ray Tube
CRYPTO ➞ Cryptographic Material
CSC ➞ Card Security Code
CSfC ➞ Commercial Solutions For Classified
CSIR ➞ Cyber Security Incident Responder
CSO ➞ Chief Security Officer
CSP ➞ Critical Security Parameter
CSP ➞ Credential Service Provider
CSS ➞ Certificate Status Server
CSTVRP ➞ Computer Security Technical Vulnerability Reporting Program
CTAK ➞ Cipher Text Auto-Key
CTI ➞ Cyber Threat Intelligence
CTO ➞ Chief Technology Officer
CTR ➞ Counter Mode
CTS ➞ Computerized Telephone System
CTTA ➞ Certified TEMPEST Technical Authority
CUAS ➞ Common User Application Software
CVC ➞ Card Validation Code
CVC2 ➞ Card Validation Code 2
CVE ➞ Common Vulnerabilities And Exposures
CVSS ➞ Common Vulnerability Scoring System
CVV ➞ Card Verification Value
CVV2 ➞ Card Verification Value 2
CW ➞ Control Word
CWE ➞ Common Weakness Enumeration
CWSS ➞ Common Weakness Scoring System
D
DAA ➞ Designated Approval Authority
DAC ➞ Discretionary Access Control
DASD ➞ Direct Access Storage Device
DAT ➞ Digital Audio Tape
DBA ➞ DatabaseAdministrator
DBMS ➞ Database Management System
DCOM ➞ Distributed Component Object Model
DCO-RA ➞ Defensive Cyberspace Operation Response Action
dCRL ➞ Delta-CRL
DCS ➞ Distributed Control System
DDL ➞ Data Definition Language
DDoS ➞ Distributed Denial of Service
DEA ➞ Data Encryption Algorithm
DEK ➞ Data Encryption Key
DER ➞ Distinguished Encoding Rules
DES ➞ Data Encryption Standard
DH ➞ Diffie-Hellman
DH ➞ Diffie-Hellman algorithm
DHCP ➞ Dynamic Host Configuration Protocol
DII ➞ Defense Information Infrastructure
DIO ➞ Defence Intelligence Organisation
DKIM ➞ DomainKeys Identified Mail
DLP ➞ Data Loss Prevention
DMA ➞ Direct Memory Access
DMARC ➞ Domain-Based Message Authentication, Reporting And Conformance
DML ➞ Data Manipulation Language
DMZ ➞ Demilitarized Zone
DN ➞ Distinguished Name
DNR ➞ Dialed Number Recorder
DNS ➞ Domain Name System
DNSSEC ➞ Domain Name System Security Extensions
DOB ➞ Dirk-Otto Brzezinski
DOC ➞ Documentacja
DODIN ➞ Department Of Defense Information Networks
DOS ➞ Disk Operating System
DoS ➞ Denial Of Service
DP ➞ Detecting Point
DPI ➞ Deep Packet Inspection
DPI ➞ DPI Functional Entity
DPI ➞ DPI Physical Entity
DRBG ➞ Deterministic Random Bit Generator Mechanism
DRP ➞ Disaster Recovery Plan
DSA ➞ Digital Signature Algorithm
DSB ➞ Dedicated Security Device
DSP ➞ Demand Side Platform
DSS ➞ Decision Support Systems
DSS ➞ Digital Signature Standard
DTA ➞ Digital Transformation Agency
DTD ➞ Data Transfer Device
DTLS ➞ Descriptive TopLevel Specification
DWIM ➞ Do What I Mean
E
EAA ➞ Entity Authentication Assurance
EAC ➞ Entity Authentication Centre
EAL ➞ Evaluation Assurance Level
EAM ➞ Embedded Audit Module
EAP ➞ Emergency Action Plan
EAP ➞ Extensible Authentication Protocol
EAP-TLS ➞ Extensible Authentication Protocol-Transport Layer Security
EARL ➞ End-Entity Attribute Certificate Revocation List
Eauthentication ➞ Electronic Authentication – Eauthentication
EBCDIC ➞ Extended Binary-Coded For Decimal Interchange Code
Ebusiness ➞ Electronic Business
EC ➞ Elliptic Curve Digital Signature
ECAB ➞ Emergency Change Advisory Board
ECB ➞ Electronic Codebook
ECC ➞ Elliptical Curve Cryptography
ECC ➞ Elliptic Curve Cryptography
ECDH ➞ Elliptic Curve Diffie-Hellman
ECDS ➞ Enterprise Cross Domain Services
ECDSA ➞ Elliptic Curve Digital Signature Algorithm
ECU ➞ End Cryptographic Unit
EDI ➞ Electronic Data Interchange
EDR ➞ Endpoint Detection And Response
EEPROM ➞ Electrically Erasable Programmable Read-Only Memory
EFD ➞ Electronic Fill Device
EFF ➞ ELECTRONIC FRONTIER FOUNDATION
EFT ➞ Electronic Funds Transfer
EFTPOS ➞ Electronic Funds Transfer At Point Of Sale
EGP ➞ Exterior Gateway Protocol
EICAR ➞ European Institute for Computer Antivirus Research
EICAR ➞ EICAR Standard Antivirus Test File
EMET ➞ Enhanced Mitigation Experience Toolkit
EMI ➞ Electromagnetic Interference
EMM ➞ Enterprise Mobility Management
EMSEC ➞ Emanation Security
EMSEC ➞ Electromagnetic Emanations Security
EMSEC ➞ Emanations Security
EMV ➞ Europay MasterCard Visa
EPIC ➞ THE ELECTRONIC PRIVACY INFORMATION CENTER
EPL ➞ Evaluated Products List
EPRL ➞ End-Entity Public-Key Certificate Revocation List
EPROM ➞ Erasable Programmable Read-Only Memory
ESP ➞ Encapsulation Security Payload
EUD ➞ End User Device
EVA ➞ Economic Value Add
EVCERT ➞ Extended Validation Certificate Framework
F
FAIR ➞ Factors Analysis In Information Risk Model
FAR ➞ False Acceptance Rate
FAT ➞ File Allocation Table
FDDI ➞ Fiber Distributed Data Interface
FDE ➞ Full Disk Encryption
FDR ➞ Field Definition Record
FEA ➞ Federal Enterprise Architecture
FEAL ➞ Fast Data Encipherment Algorithm
FEP ➞ Front-End Processor
FIDO ➞ Fast Identity Online
FIN ➞ Final
FIPS ➞ Federal Information Processing Standards
FIPS ➞ FIPS PUB 140
FIPS PUB ➞ FIPS PUB
FIRST ➞ Forum of Incident Response and Security Teams
FISMA ➞ Federal Information Security Management Act
FISSEA ➞ Federal Information Systems Security Educators’ Association
FOUO ➞ For Official Use Only
FPKI ➞ Federal Public-key Infrastructure
FPKI PA ➞ Federal Public Key Infrastructure Policy Authority
FQDN ➞ Fully Qualified Domain Name
FRR ➞ False Rejection Rate
FS-ISAC ➞ Financial Services Information Sharing And Analysis Center
FTLS ➞ Formal Top-Level Specification
FTP ➞ File Transfer Protocol
G
GAS ➞ Generalized Audit Software
GB ➞ GIGABYTE
GDOI ➞ Group Domain of Interpretation
GDPR ➞ General Data Protection Regulation
GII ➞ Global Information Infrastructure
GIS ➞ Geographical Information System
GNU ➞ GNU
GOD ➞ Global OutDial
GOSIP ➞ Government OSI Profile
GOTS ➞ Government Off The Shelf
GPRS ➞ General Packet Radio Service
GPS ➞ Global Positioning System
GRC ➞ Governance, Risk Management And Compliance
GUI ➞ Graphical User Interface
GULS ➞ Generic Upper Layer Security
H
HACE ➞ High Assurance Cryptographic Equipment
HAG ➞ High Assurance Guard
HAIPE ➞ High Assurance Internet Protocol Encryptor
HAIPE-IS ➞ High Assurance Internet Protocol Encryptor Interoperability Specification
HCR ➞ Handprint Character Recognition
HDLC ➞ High-Level Data-Link Control
HDSL ➞ High-Data-Rate Digital Subscriber Line
HIDS ➞ Host Intrusion Detection System
HIE ➞ Health Information Exchange
HIPAA ➞ Health Information Portability And Accountability
HIPS ➞ Host-Based Intrusion Prevention System
HMAC ➞ Hashed Message Authentication Code
HOPE ➞ Hackers On Planet Earth
HSM ➞ Hardware Security Module
HSTS ➞ HTTP Strict Transport Security
HTML ➞ Hypertext Markup Language
HTTP ➞ Hypertext Transfer Protocol
HTTPS ➞ Hypertext Transfer Protocol Secure
Hz ➞ Hertz
I
IA ➞ Information Assurance Professional
IAAS ➞ Infrastructure-As-A-Service
IaaS ➞ Infrastructure As A Service
IAM ➞ Identity And Access Management
IANA ➞ Internet Assigned Numbers Authority
IAO ➞ Information Assurance Officer
IAP ➞ Intercept Access Point
IATO ➞ Interim Approval To Operate
IATT ➞ Interim Approval To Test
IAVB ➞ Information Assurance Vulnerability Bulletin
IBM ➞ International Business Machines Incorporated
IBM-PC ➞ International Business Machines Personal Computer
IC ➞ Intelligence Community
ICAM ➞ Identity, Credential, And Access Management
ICANN ➞ Internet Corporation for Assigned Names and Numbers
ICE ➞ Intrusion Countermeasure Electronics
ICMP ➞ Internet Control Message Protocol
iCRL ➞ Indirect CRL
ICS ➞ Industrial Control System
ICS-CERT ➞ The Industrial Control Systems Cyber Emergency Response Team
ICT ➞ Information And Communications Technology
IDD ➞ Integrated Data Dictionary
IDEA ➞ International Data Encryption Algorithm
IDF ➞ Intermediate Distribution Frame IDF
IdM ➞ Identity Management
IdP ➞ Identity Provider
IDPS ➞ Intrusion Detection And Prevention System
IDS ➞ Intrusion Detection System
IdSP ➞ Identity Service Provider
IEEE ➞ Institute of Electrical and Electronics Engineers, Inc.
IETF ➞ Internet Engineering Task Force
IIOP ➞ Internet Inter-ORB Protocol
IKE ➞ Internet Key Exchange
ILF ➞ Internet Liberation Front
IM ➞ Instant Messaging
IMAP4 ➞ Internet Message Access Protocol Version 4
IMEI ➞ International Mobile Station Equipment Identity
IMUN ➞ International Mobile User Number
INFOCON ➞ Information Operations Condition
INFOSEC ➞ Information Systems Security Boundary
INFOSEC ➞ Information Security
IOC ➞ Indicators Of Compromise
IODEF ➞ Incident Object Description Exchange Format
IOS ➞ IOS
IoT ➞ Internet Of Things
IOTP ➞ Internet Open Trading Protocol
IP ➞ Intellectual Property
IP ➞ Intelligent Peripheral
IP ➞ Internet Protocol
IPF ➞ Information Processing Facility
IPL ➞ Initial Program Load
IPRA ➞ Internet Policy Registration Authority
IPS ➞ Voice Intrusion Prevention System
Ipsec ➞ Internet Protocol Security
IPX_SPX ➞ Internetwork Packet Exchange-Sequenced Packet Exchange
IRAP ➞ Information Security Registered Assessors Program
IRAS ➞ Risk Analysis Service
IRR ➞ Internal Rate Of Return
IS ➞ Information System
ISAKMP ➞ Internet Security Association and Key Management Protocol
ISAM ➞ Indexed Sequential Access Method
ISBN ➞ ISO 2108 International Standard Book Number
ISC2 ➞ The International Information System Security Certification Consortium
ISCP ➞ Information System Contingency Plan
ISDN ➞ Integrated Services Digital Network
ISE ➞ Information Sharing Environment
ISIRT ➞ Information Security Incident Response Team
ISM ➞ Information Security Manual
ISMS ➞ Information Security Management System
ISO ➞ International Organization for Standardization
ISP ➞ Internet Service Provider
ISSA ➞ Information Systems Security Association
ISSN ➞ Integrated Special Services Network
ISSN ➞ ISO 3297 International Standard Serial Number
ISSO ➞ Information System Security Officer
ITAR ➞ International Traffic in Arms Regulations
ITF ➞ Integrated Test Facilities
ITGI ➞ IT Governance Institute
ITIL ➞ Information Technology Infrastructure Library
ITU ➞ International Telecommunication Union
ItW ➞ Wild In The
IV ➞ Initialization Vector Collisions
IV ➞ Initialization Value
IV&V ➞ Independent Verification And Validation
IVA ➞ Independent Validation Authority
J
JBOH ➞ JavaScript-Binding-Over-HTTP
JCL ➞ Job Control Language
JCSC ➞ Joint Cyber Security Centre
JSON ➞ JavaScript Object Notation
K
KB ➞ KILOBYTE
KDC ➞ Key Distribution Center
KEA ➞ Key Exchange Algorithm
KEK ➞ Key-Encrypting Key
KGI ➞ Key Goal Indicator
KISS ➞ Keep It Simple, Stupid
KLIF ➞ Key Loading and Initialization Facility
KME ➞ Key Management Entity
KMI ➞ Key Management Infrastructure
KMID ➞ Keying Material Identifier
KMP ➞ Key Management Protocol
KP ➞ Key Processor
KPI ➞ Key Performance Indicator
KPK ➞ Key Production Key
KRI ➞ Key Risk Indicator
L
L2F ➞ L2F Protocol
L2TP ➞ Layer 2 Tunnelling Protocol
L3,4HI ➞ L3,4 Header Inspection
L4+HI ➞ L4+ Header Inspection
L4PI ➞ L4 Payload Inspection
L7PI ➞ L7 Payload Inspection
LASS ➞ Local Area Signalling Services
LCMS ➞ Local COMSEC Management Software
LDAP ➞ Lightweight Directory Access Protocol
LEA ➞ Law Enforcement Authority
LEAF ➞ Law Enforcement Access Field
LKM ➞ Loadable Kernel Modules
LMD ➞ Local Management Device
LMD_KP ➞ Local Management Device-Key Processor
LOD ➞ THE LEGION OF DOOM
LOD_H ➞ LOD_H
LOTOS ➞ Language of Temporal Ordering Specification
LRU ➞ Least Recently Used
LSD ➞ LEAST SIGNIFICANT DIGIT
M
MAC ➞ Media Access Control
MAC ➞ Mandatory Access Control
MAC ➞ Message Authentication Code
MAEC ➞ Malware Attribution Enumeration And Characterization Format
MAN ➞ Metropolitan Area Network
MB ➞ Megabyte
MBR ➞ Master Boot Record
MCA ➞ Merchant Certification Authority
MD2 ➞ The MD2 Message-Digest Algorithm
MD4 ➞ The MD4 Message-Digest Algorithm
MD5 ➞ The MD5 Message-Digest Algorithm
MDM ➞ Mobile Device Management
MF ➞ Master File
MFA ➞ Multi-Factor Authentication
MHS ➞ Message Handling System
MHz ➞ MEGAHERTZ
MICR ➞ Magnetic Ink Character Recognition
MIME ➞ Multipurpose Internet Mail Extensions
MIMO ➞ Multiple-Input And Multiple-Output
MIS ➞ Management Information System
MISPC ➞ Minimum Interoperability Specification for PKI Components
MISSI ➞ Multilevel Information System Security Initiative
MitM ➞ Man-In-The-Middle
MitM ➞ Man-In-The-Middle Attack (On Otp)
MLS ➞ Multilevel Secure
MOA ➞ Memorandum Of Agreement
MOD ➞ MASTERS OF DISASTER
MODEM ➞ Modulator-DEModulator
MOE ➞ Measures Of Effectiveness
MOSS ➞ MIME Object Security Services
MO-TO ➞ Mail-Order-Telephone-Order
MOU ➞ Memorandum Of Understanding
MQV ➞ AJ Menezes, M. Qu, SA Vanstone
MSATA ➞ Mini-Serial Advanced Technology Attachment
MSK ➞ Master Session Key
MSP ➞ Managed Service Provider
MSP ➞ Message Security Protocol
MtE ➞ MtE Engine
MTO ➞ Maximum Tolerable Outages
MTX ➞ MTX Virus
N
NaaS ➞ Network As A Service
NAC ➞ Network Access Control
NAC ➞ Network Access Controller
NAK ➞ Negative Acknowledgment
NAL ➞ Network Access Layer
NAND ➞ NAND
NAPs ➞ Network Access Points
NAPT ➞ Network Address Port Translation
NARK ➞ NARK
NAS ➞ Network Attached Storage
NAT ➞ Network Address Translator
NBN ➞ National Broadband Network
NCCIM ➞ Nuclear Command And Control Information Assurance Material
NCIRS ➞ National COMSEC Incident Reporting System
NCSC ➞ National Computer Security Center
NDA ➞ Non-Disclosure Agreement
NetBIOS ➞ Network Basic Input-Output System
NFC ➞ Near Field Communication
NFP ➞ Not For Profit
NGN ➞ Next Generation Network
NIAP ➞ National Information Assurance Partnership
NIC ➞ Network Interface Card
NICE ➞ National Initiative For Cybersecurity Education’S Cybersecurity Workforce Framework
NIDS ➞ Network Intrusion Detection System
NII ➞ National Information Infrastructure
NIPRNET ➞ The Non-Classified Internet Protocol (IP) Router Network
NIST ➞ National Institute For Standards And Technology
NLSP ➞ Network Layer Security Protocol
NNTP ➞ Network News Transfer Protocol
No-Op ➞ No Operation
NOP ➞ No Operation
NOR ➞ NOR
NOT ➞ NOT CIRCUIT
NPE ➞ Non-Person Entity
NPI ➞ Non-Public Personal Information
NPV ➞ Net Present Value
NRIC ➞ National Reliability and Interoperability Council
NRT ➞ Non-Repudiation Token
NSA ➞ NATIONAL SECURITY AGENCY
NVD ➞ National Vulnerability Database
nVir ➞ nVir Virus
O
OCIL ➞ Open Checklist Interactive Language
OCO ➞ Offensive Cyberspace Operations
OCR ➞ Optical Character Recognition
OCSP ➞ Online Certificate Status Protocol
OCTAVE ➞ Operational Critical Threat, Asset and Vulnerability Evaluation
OECD ➞ Organization For Economic Cooperation And Development
OFB ➞ Output Feedback
OID ➞ Object Identifier
OIDIRI ➞ OID-Internationalized Resource Identifier
OLA ➞ Operational Level Agreement
OLE ➞ Object Linking and Embedding
OMG ➞ Object Management Group
OOA ➞ Object-Oriented Analysis
OOB ➞ Out Of Band
OOD ➞ Object-Oriented Design
OODBMS ➞ Object-Oriented Database Management System
OPCODE ➞ Operations Code
OPSEC ➞ Operations Security
ORA ➞ Organizational Registration Authority
ORB ➞ Object Request Broker
OS ➞ Operating System
OSI ➞ Open Systems Interconnect
OSI ➞ Open Systems Interconnection
OSIRM ➞ Open Systems Interconnection Reference Model
OSP ➞ OTP Service Provider
OSPF ➞ Open Shortest Path First
OSS/BSS ➞ Operation Support System/Business Support System
OTAD ➞ Over-The-Air Key Distribution
OTAR ➞ Over-The-Air Rekeying
OTAT ➞ Over-The-Air Key Transfer
OTP ➞ One Time Password
OTP ➞ One-Time Pad
OVAL ➞ Open Vulnerability Assessment Language
OWASP ➞ Open Web Application Security Project
P
P2P ➞ Peer-To-Peer
PAA ➞ Policy Approving Authority
PaaS ➞ Cloud Platform As A Service
PAAS ➞ Platform As A Service
PABX ➞ Private Automatic Branch Exchange
PaCSON ➞ Pacific Cyber Security Operational Network
PA-DSS ➞ Payment Application Data Security Standard
PAN ➞ Primary Account Number
PAO ➞ Principal Authorizing Official
PAP ➞ Password Authentication Protocol
PAP ➞ Password Authentication Protocol
PAP ➞ Policy Administration Point
PARM ➞ Parameter
PAW ➞ Privileged Access Workstation
PBAC ➞ Policy Based Access Control
PBX ➞ Private Branch Exchange
PC ➞ Personal Computer
PCA ➞ Policy Certification Authority
PCA ➞ Policy Creation Authority
PCI DSS ➞ Payment Card Industry Data Security Standard
PCL ➞ Product Compliant List
PCM ➞ Privilege Certificate Manager
PDA ➞ Personal Digital Assistant
PDE ➞ Position Determining Entity
PDF ➞ Portable Document Format
PDF ➞ Policy Decision Function
PDN ➞ Packet Data Network
PDP ➞ Packet Data Protocol
PDP ➞ Policy Decision Point
PDS ➞ Protective Distribution System
PDU ➞ Protocol-Data-Unit
PEM ➞ Privacy Enhanced Mail
PEP ➞ Policy Enforcement Point
PERT ➞ Program Evaluation And Review Technique
PFS ➞ Perfect Forward Secrecy
PFS ➞ Perfect Forward Secrecy
PFS ➞ Public-Key Forward Secrecy
PGP ➞ Pretty Good Privacy
PIA ➞ Privacy Impact Assessment
PII ➞ Personally Identifiable Information
PIN ➞ Personal Identification Number
PING ➞ Packet Internet Grouper
PIP ➞ Policy Information Point
PIT ➞ Platform IT
PITM ➞ Person-In-The-Middle
PIV Card ➞ Personal Identity Verification Card
PKCS ➞ Public-Key Cryptography Standards
PKCS ➞ Public Key Cryptography Standards #10
PKCS ➞ Public Key Cryptography Standards #11
PKCS ➞ Public Key Cryptography Standards #5
PKCS ➞ Public Key Cryptography Standards #7
PKD ➞ Public Key Directory
PKI ➞ Public Key Infrastructure
PKI ➞ Public Key Infrastructure
PLC ➞ Programmable Logic Controllers
PLI ➞ Private Line Interface
PLMN ➞ Public Land Mobile Network
PLMN operator ➞ Public Land Mobile Network Operator
PMA ➞ Policy Management Authority
PMK ➞ Pairwise Master Key
PMM ➞ Privacy Maturity Model
PMO ➞ Project Management Officer
POA&M ➞ Plan Of Action And Milestones
POP ➞ Point-Of-Presence
POP3 ➞ Post Office Protocol, Version 3
POS ➞ Point-Of-Sale Systems
POSI ➞ Portable Operating System Interface
POTS ➞ Plain Old Telephone System
PP ➞ Protection Profile
PPCP ➞ PowerPC Platform
PPL ➞ Preferred Products List
PPP ➞ Point-To-Point Protocol
PPS ➞ Physically Protected Space
PPTP ➞ Point-To-Point Tunneling Protocol
PPV ➞ Pay-Per-View
PReP ➞ PowerPC Reference Platform
PRM ➞ Performance Reference Model
PROM ➞ Programmable Read-Only Memory
P-S ➞ PHALCON-SKISM
PSC ➞ Protective Security Circular
PSE ➞ Personal Security Environment
PSK ➞ Pre-Shared Key
PSPF ➞ Protective Security Policy Framework
PSTN ➞ Public Switched Telephone Network
PTK ➞ Pair-Wise Transient Key
PUA ➞ Potentially Unwanted Applications
PUS ➞ Potentially Unwanted Software
PWN ➞ PHRACK WORLD NEWS
Q
QA UAT ➞ Quality Analysis And User Acceptance Testing
QAZ ➞ QAZ
QIR ➞ Qualified Integrator Or Reseller
QMS ➞ Quality Management System
QoS ➞ Quality Of Service
R
RA ➞ Registration Authority
RAdAC ➞ Risk Adaptable Access Control
RADAR ➞ RADAR
RADIUS ➞ Remote Authentication Dial-In User Service
RAF ➞ Risk Analysis Function
RAFE ➞ Risk Analysis Functional Entity
RAID ➞ Redundant Array Of Inexpensive Disks
RAM ➞ Random-Access Memory
RAR ➞ Risk Assessment Report
RARP ➞ Reverse Address Resolution Protocol
RAS ➞ Remote Access Service
RASF ➞ Recipient-Side ASF
RAT ➞ Remote Access Trojan
RATIO ➞ RATIO
RBAC ➞ Role Based Access Control
RBG ➞ Random Bit Generator
RBL ➞ Real-Time Blocking List
RBOCS ➞ Regional Bell Operating Companies
RC2 ➞ Rivest Cipher #2
RC4 ➞ Rivest Cipher #4
RC6 ➞ Rivest Cipher #6
RCFE ➞ Risk Classification Functional Entity
RDBMS ➞ Relational Database Management System
RDC ➞ Remote Deposit Captures
RDFE ➞ Risk Detection Functional Entity
RDN ➞ Relative Distinguished Name
RDP ➞ Remote Desktop Protocol
REMOB ➞ REMote OBservation
ReSA ➞ Receiver Security Agent
RF ➞ Radio Frequency
RFC ➞ Request For Change
RFC ➞ Request For Comment
RFID ➞ Radio Frequency Identification
RFP ➞ Request For Proposal
RID ➞ Real-Time Inter-Network Defense
RIP ➞ Routing Information Protocol
RJE ➞ Remote Job Entry
RKS ➞ Record Keeping Server
RMF ➞ Risk Management Framework
RMFE ➞ Risk Mitigation Functional Entity
ROC ➞ Report On Compliance
ROE ➞ Rules Of Engagement
RoE ➞ Risk Of Exposure
ROI ➞ Return On Investment
ROM ➞ Read-Only Memory
ROT13 ➞ Rotate 13
ROV ➞ Report On Validation
RP ➞ Relying Party
RPC ➞ Remote Procedure Call
RPO ➞ Recovery Point Objective
RSA ➞ RSA Encryption
RSA ➞ Rivest-Shamir-Adleman
RSBAC ➞ Rule Set Based Access Control
RSF ➞ Risk Search Function
RSN ➞ Robust Security Network
RSNA ➞ Robust Security Network Association
RSP ➞ Risk Service Profile
RSS ➞ Really Simple Syndication
RTP ➞ Real-Time Traffic Protocol
S
S/KEY ➞ System S/KEY
S/MIME ➞ Secure/MIME
S_MIME ➞ Secure Multipurpose Internet Mail Extensions
SA ➞ System Administrator
SA ➞ Security Association
SAA ➞ Security Association Attributes
SaaS ➞ Software-As-A-Service
SaaS ➞ Software As A Service
SAD ➞ Security Association Database
SAID ➞ Security Association Identifier
SAISO ➞ Senior Agency Information Security Officer
SAML ➞ Security Assertion Markup Language
SANs ➞ Storage Area Networks
SANSW ➞ Secure Answering
SAP ➞ Service Access Point
SAP ➞ Special Access Program
SApp ➞ Security Application
SAR ➞ Security Assessment Report
SAS ➞ Security Application Software
SASF ➞ Sender-Side ASF
SASL ➞ Simple Authentication And Security Layer
SASUS ➞ Security Application Software Updating Server
SATAN ➞ Security Administrator Tool For Analyzing Networks
SBC ➞ Session Border Controller
S-BGP ➞ Secure BGP
SCA ➞ Security Control Assessor
SCA ➞ Security Correlation Agent
SCA ➞ Subordinate CA
SCEC ➞ Security Construction And Equipment Committee
SCF ➞ Security Communication Function
SCI ➞ Security Control Information
SCI ➞ Security Correlation Information
SCIF ➞ Sensitive Compartmented Information Facility
SCIP ➞ Secure Communications Interoperability Protocol Product
SCM ➞ Supply Chain Management
SCOMP ➞ Secure Communications Processor
SCRM ➞ Supply Chain Risk Management
SCS ➞ Security Correlation Server
SDE ➞ Secure Data Exchange
SDLC ➞ Systems Development Life Cycle
SDNS ➞ Secure Data Network System
SDO ➞ Service Delivery Objective
SDSE ➞ Shadowed DSA Specific Entry
SDU ➞ Service Data Unit
SE ➞ Social Engineering
SECaaS ➞ Security As A Service
SECDNS ➞ Secure DNS
SED ➞ Self-Encrypting Devices – Self-Encrypting Drives
SEG ➞ Security Equipment Guide
SEI ➞ Security Exchange Item
SENV ➞ Secure Envelope
SEO ➞ Search Engine Optimisation
SESE ➞ Security Exchange Service Element
SET ➞ SET Secure Electronic Transaction
SETCo ➞ SET Secure Electronic Transaction LLC
SFA ➞ Single Factor Authentication
S-FTP ➞ Secure-FTP
SFUG ➞ Security Features Users Guide
SGML ➞ Standard Generalized Markup Language
SHA1 ➞ Secure Hash Algorithm – Revision 1
SHA-1 ➞ SHA-1
SHA-2 ➞ SHA-2
SHS ➞ Secure Hash Standard
S-HTTP ➞ Secure Hypertext Transfer Protocol
SI ➞ Security Information
SIEM ➞ Security Information And Event Management
SILS ➞ Standards For Interoperable LAN/MAN Security
SIO ➞ Security Information Object
SIP ➞ Session Initiation Protocol
SISO ➞ Senior Information Security Officer
SJG ➞ STEVE JACKSON GAMES
SKEME ➞ Secure Key Exchange Mechanism for Internet
SKIP ➞ Simple Key Management For Internet Protocols
SLA ➞ Service-Level Agreement
SLIP ➞ Serial Line Internet Protocol
SLOC ➞ Source Lines Of Code
SMART ➞ Specific, Measurable, Attainable, Realistic And Timely
SME ➞ Subject Matter Expert
SMEs ➞ Small And Medium Enterprises
SMF ➞ Service Management Function
SMI ➞ Security Management Infrastructure
SMS ➞ Short Message Service
SMS ➞ Security Management System
SMS ➞ Short Message Service
SMSC ➞ Short Message Service Centre
SMTP ➞ Simple Mail Transfer Protocol
SNMP ➞ Simple Network Management Protocol
SOA ➞ Service-Oriented Architecture
SOA ➞ Source Of Authority
SOAP ➞ Simple Object Access Protocol
SOAR ➞ Security Orchestration, Automation And Response
SOC ➞ Security Operations Center
SoD ➞ Segregation-Separation Of Duties
SOE ➞ Standard Operating Environment
SONET ➞ Synchronous Optical NETwork
SOP ➞ Standard Operating Procedure
SOP ➞ Self-Organizing Protocol
SORA ➞ SSO-PIN ORA
SP ➞ Special Publication
SP ➞ Service Provider
SP3 ➞ Security Protocol 3
SP4 ➞ Security Protocol 4
SPD ➞ Security Policy Database
SPF ➞ Sender Policy Framework
SPI ➞ Security Parameters Index
SPIM ➞ Spam Over Instant Messaging
SPIT ➞ Spam Over Internet Telephony
SPK ➞ Single Point Keying
SPKI ➞ Simple Public Key Infrastructure
SRF ➞ Spam Recipient Function
SRG ➞ Security Requirements Guide
SSA ➞ Security Information Sharing Agreement
SSA ➞ Sender Security Agent
SSC ➞ Subscriber Security Control
SSH ➞ Secure Shell
SSID ➞ Service Set Identifier
SSL ➞ Secure Sockets Layer
SSO ➞ Single-Sign-On
SSO ➞ Single Sign-On
SSO ➞ System Security Object
SSO PIN ➞ Single Sign On Password Identification Number
SSP ➞ System Security Plan
SSP ➞ Security Information Sharing Policy
ST&E ➞ Security Test & Evaluation
STAR ➞ Short Title Assignment Requester
STIG ➞ Security Technical Implementation Guide
SWID ➞ Software Identification Tag
SWOT ➞ Strengths, Weaknesses, Opportunities And Threats
SYN ➞ Synchronize
SYSADMIN ➞ System Administrator
T
T1 ➞ T1
T1, T3 ➞ T1, T3
TA ➞ Trusted Agent
TACACS ➞ Terminal Access Controller Access Control System
TACACS+ ➞ Terminal Access Controller Access-Control System Plus
TAI ➞ Telebiometrics Authentication Infrastructure
TAUT ➞ Terminal Authentication
TBA ➞ Telebiometric Authority
TC ➞ Technical Community
TCB ➞ Trusted Computing Base
TCC Field ➞ Transmission Control Code Field
TCG ➞ Trusted Computing Group
TCO ➞ Total Cost Of Ownership
TCP ➞ Transmission Control Protocol
TCP/IP ➞ Transmission Control Protocol/Internet Protocol
TCP_IP ➞ Transmission Control Protocol – Internet Protocol
TCSEC ➞ Trusted Computer Security Evaluation Criteria
TCSEC ➞ DoD Trusted Computer System Evaluation Criteria
TCT ➞ Total Call Time
TD ➞ Terminal Device
TDEA ➞ Triple Data Encryption Algorithm
TEMPEST ➞ Transient ElectroMagnetic PulsE Surveillance Technology
TESS ➞ The Exponential Encryption System
TFC ➞ Traffic-Flow Confidentiality
TFCI ➞ Transport Format Combination Indicator
TGS ➞ Ticket Granting Server
TK ➞ Temporal Key
TKEY ➞ Transaction Key
TLP ➞ Traffic Light Protocol
TLS ➞ Transport Layer Security
TMS ➞ Tape Management System
TOAST ➞ The Only Antivirus Software That Won’t Be Obsolete By The Time You Finish Reading This Ad
TOC/TOU ➞ Time-Of-Check To Time-Of-Use
TOE ➞ Target Of Evaluation
TPE ➞ Trident Polymorphic Engine
TPI ➞ TwoPerson Integrity
TPM ➞ THE PUNK MAFIA
TPM ➞ Trusted Platform Module
TPM ➞ Trusted Platforms
TRANSEC ➞ Transmission Security
TrKEK ➞ Transfer Key Encryption Key
TRM ➞ Technical Reference Model
TRW ➞ TRW
TSA ➞ Time Stamping Authority
TSCM ➞ Technical Surveillance Countermeasures
TSEC ➞ Telecommunications Security Nomenclature
TSEC ➞ Telecommunications Security Word System
TSF ➞ TOE Security Functions
TSIG ➞ Trusted Systems Interoperability Group
TSP ➞ TOE Security Policy
TTP ➞ Trusted Third Party
TTP ➞ Trusted Third Party For Confidentiality Facilities
TTY ➞ Text Telephone Or Telephone Typewriter
U
U.S. ➞ National Do-Not-Call Registry
UDDI ➞ Universal Description, Discovery And Integration
UDP ➞ User Datagram Protocol
UI ➞ User Interface
UICC ➞ Universal IC Card
UID ➞ User ID
UID ➞ User Identity
UNI ➞ User-To-Network Interface
UPP ➞ User Partnership Program
URI ➞ Uniform Resource Identifier
URL ➞ Uniform Resource Locator
URN ➞ Uniform Resource Name
URS ➞ User Reputation System
USB ➞ Universal Serial BUS
US-CERT ➞ United States Computer Emergency Readiness Team
USGCB ➞ United States Government Configuration Baseline
USSS ➞ UNITED STATES SECRET SERVICE
UTC ➞ Coordinated Universal Time
UTC ➞ UTCTime
UTP ➞ Unshielded Twisted Pair
UX ➞ User Experience
V
VAN ➞ Value-Added Network
VMB ➞ Voice Mail Box
VMM ➞ Virtual Machine Monitor
VMS ➞ VMS
VoD ➞ Video On Demand
VPN ➞ Virtual Private Network
VR ➞ Virtual Reality
VSPPS ➞ VoIP Spam Prevention Policy Server
VSPRBL ➞ RBL Central System For Voip Spam Prevention
VSPS ➞ VoIP Spam Prevention System
VX ➞ Virus eXchange
W
W3 ➞ World Wide Web
W3C ➞ World Wide Web Consortium
WAF ➞ Web Application Firewall
WAP ➞ Wireless Access Point
WCM ➞ Web Content Management
WEP ➞ Wired Equivalent Privacy
WIDS ➞ Wireless Intrusion Detection System
WLAN UE ➞ WLAN User Equipment
WNE ➞ Wireless Network Entity
WPA ➞ Wi-Fi Protected Access
WPA2 ➞ Wi-Fi Protected Access II
WSDL ➞ Web Services Description Language
WSH ➞ Windows Script Host
WSN ➞ Wireless Sensor Network
X
X,509 ➞ X.509
X.500 ➞ X.500 System
XACML ➞ EXtensible Access Control Markup Language
XAPI ➞ eXtensive Application Programming Interface
XCCDF ➞ eXtensible Configuration Checklist Description Format
xDSL ➞ Digital Subscriber Line Technologies
XFER ➞ Transfer
XML ➞ Extensible Markup Language
XOR ➞ Exclusive OR
XSS ➞ Cross Site Scripting
Y
Y2K ➞ Year 2000
Nota dotycząca źródeł
Niniejsze skróty oraz ich pełne definicje zostały opracowane na podstawie szerokiej kompilacji różnych źródeł dostępnych w internecie, literaturze branżowej oraz publikacjach. Wiele z tych materiałów pochodzi z ogólnie dostępnych zasobów, takich jak blogi, strony rządowe i komercyjne, a także książki i dokumenty, które znalazły się w publicznym obiegu. Gdzie było to możliwe, podano pełne informacje o źródłach. W przypadku starszych dokumentów lub tych, które nie zawierały pełnych danych o autorze, podano tyle informacji, ile było dostępnych.
Lista źródeł:
Źródła online
- Global Knowledge: „Cybersecurity Glossary of Terms”. Dostępne na: globalknowledge.com
- NICCS – National Initiative for Cybersecurity Careers and Studies: „A Glossary of Common Cybersecurity Words and Phrases”. Dostępne na: niccs.cisa.gov
- SANS Institute: „Glossary of Cyber Security Terms”. Dostępne na: sans.org
- NIST – Information Technology Laboratory: „Computer Security Resource Center – Glossary”. Dostępne na: csrc.nist.gov
- Allot Communications: „Top Cybersecurity Terms”. Dostępne na: allot.com
- Australian Cyber Security Centre (ACSC): „Glossary”. Dostępne na: cyber.gov.au
- Positive Technologies: „Cybersecurity Glossary”. Dostępne na: ptsecurity.com
- Bugcrowd: „The Bugcrowd Security Knowledge Platform™ – Glossary of Cybersecurity Terms”. Dostępne na: bugcrowd.com
- PCI Security Standards Council: „PCI SSC Glossary – Glossary”. Dostępne na: pcisecuritystandards.org
- International Association of Privacy Professionals (IAPP): „Glossary of Privacy Terms”. Dostępne na: iapp.org
- SANS Institute: „Risk Definitions”. Dostępne na: sans.org (Autor: Lance Spitzner)
- HYPR: „Security Encyclopedia”. Dostępne na: hypr.com
- Kaspersky Securelist: „Glossary”. Dostępne na: securelist.pl
- Compliance Dictionary: „Glossary of Compliance Terms”. Dostępne na: compliancedictionary.com
Publikacje
Navy Electricity and Electronics Training Series: „Master Glossary, Module 20”, September 1998.
Sybex CISSP Certified Information Systems Security Professional Study Guide, 2nd Edition – Autorzy: Ed Tittel, James Michael Stewart, Mike Chapple.
NCSC-TG-004-88: „Glossary of Computer Security Terms”. Library No. S-231,238. Wydane przez National Computer Security Center (NCSC) pod autorytetem Department of Defense (DoD) Directive 5215.1.
NISTIR 7298 Revision 2: „Glossary of Key Information Security Terms”. Redakcja: Richard Kissel.
ISACA®: „Glossary of Terms, English-Polish, Third edition” (2015).
FFIEC: „CAT App C Glossary, June 2015 – Appendix C: Glossary”.
Sybex Books: „Network Security Foundations” – Autor: Matthew Strebe.
Syngress Publishing: „Dictionary of Information Security” – Autor: Robert Slade.
ITIL® Foundation: „ITIL V3 Foundation Exam – The Study Guide”.
ITIL® Glossary: „ITIL® Foundation Glossary of Terms and Definitions” – AXELOS Limited 2011.
NIST Special Publication 800-60 Volume II: „Guide for Mapping Types of Information and Information Systems to Security Categories”. Autorzy: Kevin Stine, Rich Kissel, William C. Barker, Annabelle Lee, Jim Fahlsing.
Eleventh Hour CISSP® Study Guide, Third Edition.
Committee on National Security Systems: „CNSSI No. 4009”.
Słownik terminów ITIL®, wersja 2.9.0 – 2005-06-20 – Autor: R. Zientara, IBM Polska.
Hacker’s Encyclopedia – Logik Bomb (LOA-ASH), 1995-1996 (redesigned by Workaholic).